Skip to content

Commit 4d7f7b4

Browse files
committed
add testing details
1 parent 21f87c3 commit 4d7f7b4

File tree

2 files changed

+51
-19
lines changed

2 files changed

+51
-19
lines changed

src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-private-hostname.mdx

Lines changed: 50 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -110,10 +110,10 @@ In your WARP [device profiles](/cloudflare-one/connections/connect-devices/warp/
110110

111111
- <GlossaryTooltip term="initial resolved IP">Initial resolved IP</GlossaryTooltip> CGNAT range:
112112
<Render file="gateway/egress-selector-cgnat-ips" />
113-
- Private network CIDR where the application is located (for example, `10.0.0.0/8`)
113+
- Private network CIDR where the application is located
114114
- Internal DNS resolver IP
115115

116-
For more details on configuring Split Tunnels, refer to [Route private network IPs through WARP](/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-cidr/#3-route-private-network-ips-through-warp).
116+
For example, if you are using the default Split Tunnels Exclude configuration and your application and DNS resolver have private IPs in the range `10.0.0.0/8`, delete `100.64.0.0/10` and `10.0.0.0/8` from the Split Tunnels list. We recommend adding back the IPs that are not explicitly used by your network — refer to our [Split Tunnels calculator](/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-cidr/#3-route-private-network-ips-through-warp) for details.
117117

118118
#### Local Domain Fallback
119119

@@ -180,27 +180,59 @@ Access policies and Gateway network policies only support hostname-based filteri
180180

181181
### 7. Test the connection
182182

183-
End users can now reach the application by going to its private hostname. For example, to test an HTTP application, open a terminal on a WARP device and run
184-
```sh
185-
curl -v4 http://wiki.internal.local
186-
```
187-
```sh output
188-
* Trying 100.80.77.135:80...
189-
* Connected to wiki.internal.local (100.80.77.135) port 80
190-
...
191-
```
183+
WARP users can now reach the application by going to its private hostname. For example, to connect to a private web application, open a browser and go to `wiki.internal.local`.
192184

193-
The output should show a successful connection to an <GlossaryTooltip term="initial resolved IP">initial resolved IP</GlossaryTooltip>.
185+
#### Troubleshooting
194186

195-
If you [enabled the Gateway proxy](#enable-the-gateway-proxy), you can view the traffic in your [Gateway activity logs](/cloudflare-one/insights/logs/gateway-logs/). You can also check your [tunnel logs](/cloudflare-one/connections/connect-networks/monitor-tunnels/logs/) to confirm that requests are routing to the application.
187+
You can run the following tests to check if private hostname routing is properly configured.
196188

197-
### Troubleshooting
189+
1. From the WARP device, confirm that you can successfully resolve the private hostname using your internal DNS server:
198190

199-
:::note[Common misconfigurations]
200-
Routing issues are the most common type of misconfiguration. Make sure to check WARP Split Tunnels and Local Domain Fallback as described in [Step 5](#5-route-traffic-through-warp).
201-
:::
191+
```sh
192+
nslookup wiki.internal.local 10.0.0.1
193+
```
194+
195+
```sh output
196+
Server: 10.0.0.1
197+
Address: 10.0.0.1#53
198+
199+
Name: wiki.internal.local
200+
Address: 10.0.0.5
201+
```
202+
203+
If the DNS lookup fails, it means that WARP cannot connect to your internal DNS server through `cloudflared`. Check that you have a [tunnel route](#2-connect-the-dns-server-to-cloudflare) for the internal DNS server IP. Also, confirm that the DNS server IP [routes through the WARP tunnel](#split-tunnels).
204+
205+
206+
2. Run a standard `nslookup` for the private hostname:
207+
208+
```sh
209+
nslookup wiki.internal.local
210+
```
211+
212+
```sh output
213+
Server: 127.0.2.2
214+
Address: 127.0.2.2#53
215+
216+
Non-authoritative answer:
217+
Name: wiki.internal.local
218+
Address: 100.80.200.48
219+
```
220+
221+
The query should resolve using [WARP's DNS proxy](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#dns-traffic) and return a Gateway <GlossaryTooltip term="initial resolved IP">initial resolved IP</GlossaryTooltip>. If the query fails to resolve or returns a different IP, check your [Local Domain Fallback configuration](#local-domain-fallback) and [Gateway resolver policies](#3-optional-create-a-resolver-policy).
222+
223+
3. When you connect to the application using its private hostname, the device should make a connection to the <GlossaryTooltip term="initial resolved IP">initial resolved IP</GlossaryTooltip>:
224+
```sh
225+
curl -v4 http://wiki.internal.local
226+
```
227+
```sh output
228+
* Trying 100.80.200.48:80...
229+
* Connected to wiki.internal.local (100.80.200.48) port 80
230+
...
231+
```
232+
233+
You can check your [tunnel logs](/cloudflare-one/connections/connect-networks/monitor-tunnels/logs/) to confirm that requests are routing to the application's private IP.
202234

203-
For a step-by-step troubleshooting procedure, refer to [Troubleshoot private network connectivity](/cloudflare-one/connections/connect-networks/troubleshoot-tunnels/private-networks/).
235+
For a generic WARP-to-Tunnel troubleshooting procedure, refer to [Troubleshoot private network connectivity](/cloudflare-one/connections/connect-networks/troubleshoot-tunnels/private-networks/).
204236

205237
## Supported on-ramps/off-ramps
206238

src/content/docs/cloudflare-one/policies/gateway/egress-policies/egress-cloudflared.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,4 +101,4 @@ Gateway does not currently support hostname-based filtering for traffic on non-4
101101

102102
From a WARP device, open a browser and go to `app.bank.com`.
103103

104-
The traffic will appear in your [Gateway activity logs](/cloudflare-one/insights/logs/gateway-logs/); Gateway DNS logs will show that `app.bank.com` resolved to an <GlossaryTooltip term="initial resolved IP">initial resolved IP</GlossaryTooltip>, and network logs will show requests destined to that initial resolved IP. You can also check [`cloudflared` logs](/cloudflare-one/connections/connect-networks/monitor-tunnels/logs/) to confirm that requests are routing to the tunnel.
104+
You can search for `app.bank.com` in your [Gateway DNS logs](/cloudflare-one/insights/logs/gateway-logs/); the **DNS response details** section should show the public resolved IPs as well as an <GlossaryTooltip term="initial resolved IP">initial resolved IP</GlossaryTooltip>. You can also check your [Cloudflare Tunnel logs](/cloudflare-one/connections/connect-networks/monitor-tunnels/logs/) to confirm that requests are routing through the tunnel to the public resolved IPs.

0 commit comments

Comments
 (0)